Re: [Int-area] New Version Notification for draft-bonica-intarea-lossless-pmtud-00.txt

Manoj Nayak <manojnayak@juniper.net> Thu, 14 November 2019 04:35 UTC

Return-Path: <manojnayak@juniper.net>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61364120019 for <int-area@ietfa.amsl.com>; Wed, 13 Nov 2019 20:35:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=wlgHbjyn; dkim=pass (1024-bit key) header.d=juniper.net header.b=buSyAR6l
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 47pAebGRkYPr for <int-area@ietfa.amsl.com>; Wed, 13 Nov 2019 20:34:58 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFEB7120048 for <int-area@ietf.org>; Wed, 13 Nov 2019 20:34:57 -0800 (PST)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xAE4WiTY005236; Wed, 13 Nov 2019 20:34:56 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=6rgDrIQyOWu16SpoJo2+SaQTqkv6bXGi5l5XAnUIIsI=; b=wlgHbjynFiAmuHM4hyunJKdSt4/qQx9YK+gTrHI0B0Xif9PT3mn91YppalF62oQBTdE1 MthXRQgfLlO4i204nMDlRAD4ng/GptdDlwvnbhNjE23jKxab+mj4Yd08RgWvIAzXRqCU xiwguVMke9Rr/TrGxmWQ87AefCvIhEUTU3bOR/aGF1TMDgI85TjihvkxxoW8IsoA/nSj SCiJu6XYKTxA0q6eXOU0K9YJwzrkBNS7iBS66D9hChDxoA03hdrO4sXTvZjSb79BYxwC AhjcJLyamsG/JX8Te2ircEuScs+Wh0GV4VF2jqZjsdK9XYJzr3fbR+y5aFVUNBHfKwHM ew==
Received: from nam01-bn3-obe.outbound.protection.outlook.com (mail-bn3nam01lp2053.outbound.protection.outlook.com [104.47.33.53]) by mx0b-00273201.pphosted.com with ESMTP id 2w8vwy096k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 13 Nov 2019 20:34:56 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Rqac7xGGMwP4xOx/Rvz/5gaeGqZfQtBomE4d+W+RVGmL6USQk7ThQ6VrRYky6PdTsb7f0aODHki/38VI7S4JhsOK7afEy8q748k9N2qIbIPV0f7H5jlMQ367a5bg8w/yrV4EDlMuTTeeg0/2psecqgcM934vCtWDkjBqSYBxk4EqHE9COwkmWD27p39a6QafrToognb7USXxS35rfTFOJBKA4ohZgOdswsmYpnBMkVn2LBxm0KGV5bBN4drhDAsT3JIhN4d9O1eO2YqXOf6wns2iUZoBMqXphZrhm6vHkUjcduh+suIg9+3QihlwATDr6xUt0BnVSAVWAzz6PVEMUw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6rgDrIQyOWu16SpoJo2+SaQTqkv6bXGi5l5XAnUIIsI=; b=kZb8bCDpuUWfrfKEs+eHJHeBSQ7B5NO599flqF+WqTG6jzRnmG0qhVsXgtWwp6ZYclfgBy+sxsFpr56sl0V+6ewY7fpkna9mlmAUUAO2EwM2SfStXh2/dn/Y7BQW/8rUOdNfrs+QtR7K6pulPGk1sOsQxISpPn9VnM8OxYk2N2mANhhr/N8LUAzuXI24CHXtoWSInq4j9EgzxaMKQDiY+ZWlgj5VJ2k0QQYE18Ms4FCsqyzzCFwUIaBY6mhNS59mwezCMNknfOYdLZ7EbDi1hgxivDzfOwU3/eKIVIENQMDC9N7HGuqDS8DLpOeRQZ8xDJDss5wRTB5BgbYrduy4RA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6rgDrIQyOWu16SpoJo2+SaQTqkv6bXGi5l5XAnUIIsI=; b=buSyAR6lGhhehQ03V+ei2yBqRLxd3gf0BLyInkVtC+tw5p5T7zywbDr9vm2oH/BcH+ftWgF6Oe0UaGbXPAmXy81AjU1TXinEcOfxn3xJr29BR7zdxw/6fAfPZbPPYgLzdIOtg351aB4HwhfULOICk1T/pG2VRCkrkWROSGkjHHI=
Received: from SN6PR05MB4605.namprd05.prod.outlook.com (52.135.114.146) by SN6PR05MB5566.namprd05.prod.outlook.com (52.135.110.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2474.7; Thu, 14 Nov 2019 04:34:54 +0000
Received: from SN6PR05MB4605.namprd05.prod.outlook.com ([fe80::c430:e62:219a:fadc]) by SN6PR05MB4605.namprd05.prod.outlook.com ([fe80::c430:e62:219a:fadc%5]) with mapi id 15.20.2451.023; Thu, 14 Nov 2019 04:34:54 +0000
From: Manoj Nayak <manojnayak@juniper.net>
To: "touch@strayalpha.com" <touch@strayalpha.com>
CC: "int-area@ietf.org" <int-area@ietf.org>
Thread-Topic: [Int-area] New Version Notification for draft-bonica-intarea-lossless-pmtud-00.txt
Thread-Index: AQHVmqTcoBvKyY1p20OtyOpdbc0dJQ==
Date: Thu, 14 Nov 2019 04:34:54 +0000
Message-ID: <81496B9A-2325-47FB-994D-C287CEFFE4D9@juniper.net>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_Enabled=true; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_Name=Juniper Business Use Only; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_Enabled=true; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_ContentBits=0; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_Method=Standard; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_ActionId=7807d5ca-0c43-4dcf-bbd6-0000bbb37457; MSIP_Label_9784d817-3396-4a4f-b60c-3ef6b345fe55_SetDate=2019-11-14T04:27:29+0530;
user-agent: Microsoft-MacOutlook/10.1b.0.190715
x-originating-ip: [116.197.184.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: a47c3609-0af2-48d6-3028-08d768bbff1e
x-ms-traffictypediagnostic: SN6PR05MB5566:
x-microsoft-antispam-prvs: <SN6PR05MB5566FD730789EF00D2E423B8CF710@SN6PR05MB5566.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:2958;
x-forefront-prvs: 02213C82F8
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(39860400002)(376002)(396003)(366004)(136003)(199004)(13464003)(189003)(5640700003)(305945005)(5660300002)(6486002)(7736002)(14454004)(8676002)(6436002)(186003)(66574012)(229853002)(316002)(58126008)(4001150100001)(6512007)(6306002)(2906002)(6246003)(6116002)(3846002)(2501003)(91956017)(76116006)(33656002)(25786009)(476003)(66946007)(2351001)(66556008)(14444005)(478600001)(6916009)(66476007)(6506007)(53546011)(966005)(99286004)(4326008)(86362001)(4743002)(81156014)(81166006)(8936002)(66066001)(1730700003)(36756003)(102836004)(71190400001)(71200400001)(26005)(66446008)(2616005)(486006)(15650500001)(256004)(64756008); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR05MB5566; H:SN6PR05MB4605.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ymgM/HwBNc7KD8L7kNDqjBy+oVZl5xyfZFByKzSG/5VOwKlVcdDFkTsEd32Y3WWtcv7lbDeYZItLLfaTFZrRl0+FetUlevsL1pvVBpiLcazBviVLD+G+oDz9iHJo7L8r3m2ccDllA4iZLyW4YD3el6R0g1Qp06oS7QYsExOg7hpqGxxRNKKLj5Klov3TldINyseD9JuPp1ywP+e3IobUxSkMvudCrgxgGXunyRPY2AtS6R1DfnBECTus4c+VzqIs6G3sJPInhh8WBCRQuc69yWAGKXb1nGiDXpo5b27McfZww2DmHCgBXijxrIxCZuQZVXlvYWjSCYt1TDrcgPK96Re3fECNG7tGaT5StF1a7QCKqyVa6FUa4iZR0JUSPOEdgRXfFCa8R8EBgAiU3XF+X19SkstY9/TycaXjaTsXKzgXxgyliLB0yU2h2s0F0XSj
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <BA9D874533D8E24C96B53D5D837E543B@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: a47c3609-0af2-48d6-3028-08d768bbff1e
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Nov 2019 04:34:54.2724 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yXqzpsmVIeSiV3H9ZdAcouWwWqfYxl3LomXma4LVhs6/DBk/2T0iBn4EUvvo+yDL23i1d5POTb/AZVw2sBFv7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR05MB5566
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-13_06:2019-11-13,2019-11-13 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 malwarescore=0 lowpriorityscore=0 phishscore=0 priorityscore=1501 clxscore=1015 mlxscore=0 suspectscore=0 mlxlogscore=999 impostorscore=0 spamscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-1911140041
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/xZHcNyfH220fHXiucpk4XLb42_8>
Subject: Re: [Int-area] New Version Notification for draft-bonica-intarea-lossless-pmtud-00.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Nov 2019 04:35:01 -0000

Hello Joe,

Please find my reply.

>>- why does this doc assume the max ICMP is 576?
>>       we?re still talking IPv4 here; it?s still 68 (that?s why only 64 bits of the orig payload are guaranteed)
>>       (yes, your note in the end of sec 1 is relevant, but given v4-in-v4 tunneling, it?s possible that 
>> paths might be smaller than the 576 assumption)
 
We use an unused field in first 8 bytes of ICMP error/reply message. How the idea would be
affected if minimum packet size is 68 bytes or 576 bytes. As per my understanding,
existing ICMP error/reply message works in v4-in-v4 tunnelling, so it would continue to 
work with the idea proposed in our draft. we won’t let the ICMP message exceed a reasonable size. 
in our implementation, that will be 576.
 
 

>>- why would this approach find the largest fragment through a system?
>>       rfc1812 talks about various strategies, one of which is ?equal sized?, which might never find 
>> the max the way you propose
 

As per section 4.2.2.7 from rfc 1812,
 
“There are several fragmentation techniques in common use in the
Internet.  One involves splitting the IP datagram into IP
fragments with the first being MTU sized, and the others being
approximately the same size, smaller than the MTU. “
 
In both of the above cases, idea in our draft works. In our implementation,
We can assume the first fragment to be largest fragment. This first fragment remains
Largest fragment unless until one more fragment is found to be greater than the first fragment.
 
For example:
 
While assembling the fragments, 
 
   I=0;
   Largest Fragment = packet-I;
   For (, I < n , ++I)
      If ( packet-I > Largest Fragment)
        Largest Fragment = packet-I;
 
Hopefully I did not miss anything.

Regards
Manoj Nayak
    
    ------------------------------
    
    Message: 3
    Date: Tue, 29 Oct 2019 21:43:33 -0700
    From: Joe Touch <touch@strayalpha.com>
    To: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>
    Cc: "int-area@ietf.org" <int-area@ietf.org>
    Subject: Re: [Int-area] New Version Notification for
    	draft-bonica-intarea-lossless-pmtud-00.txt
    Message-ID: <A9C9D9AE-0556-46DA-BBB8-CF7889789944@strayalpha.com>
    Content-Type: text/plain;	charset=utf-8
    
    Hi, Ron,
    
    A few things come to mind. The first one, IMO, renders the rest somewhat less important.
    
    Joe
    
    -------------
    
    - this approach applies only to IPv4; not sure it?s worth trying to optimize for only that case
    	(it requires on-path fragmentation permitted)
    
    - this approach relies on ICMPs, so it?s as robust (or, more to the point, not) as PMTUD
    	if ICMPs can find the reverse path from the dest, why wouldn?t the routers?
    	i.e., isn?t the problem with ICMPs not just routers not sending them but firewalls BLOCKING them?
    	(i.e., if ICMPs would work here, PMTU would have worked, rendering this unnecessary)
    
    - why does this doc assume the max ICMP is 576?
    	we?re still talking IPv4 here; it?s still 68 (that?s why only 64 bits of the orig payload are guaranteed)
    	(yes, your note in the end of sec 1 is relevant, but given v4-in-v4 tunneling, it?s possible that paths might be smaller than the 576 assumption)
    
    - why would this approach find the largest fragment through a system?
    	rfc1812 talks about various strategies, one of which is ?equal sized?, which might never find the max the way you propose 
    
    
    > On Oct 29, 2019, at 9:53 AM, Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org> wrote:
    > 
    > Folks,
    > 
    > Please review and comment.
    > 
    >                        Ron
    > 
    > 
    > 
    > Juniper Business Use Only
    > 
    > -----Original Message-----
    > From: internet-drafts@ietf.org <internet-drafts@ietf.org> 
    > Sent: Tuesday, October 29, 2019 11:48 AM
    > To: Ron Bonica <rbonica@juniper.net>; Hakan Alpan <halpan@hnc.edu>; Radon Rosborough <rrosborough@hmc.edu>; Bradely Newton <bnewton@hmc.edu>; Miles President <mpresident@hmc.edu>; Manoj Nayak <manojnayak@juniper.net>
    > Subject: New Version Notification for draft-bonica-intarea-lossless-pmtud-00.txt
    > 
    > 
    > A new version of I-D, draft-bonica-intarea-lossless-pmtud-00.txt
    > has been successfully submitted by Ron Bonica and posted to the IETF repository.
    > 
    > Name:		draft-bonica-intarea-lossless-pmtud
    > Revision:	00
    > Title:		Lossless Path MTU Discovery (PMTUD)
    > Document date:	2019-10-29
    > Group:		Individual Submission
    > Pages:		8
    > URL:            https://urldefense.com/v3/__https://tools.ietf.org/html/draft-bonica-intarea-lossless-pmtud-00__;!8WoA6RjC81c!XifH7EcqHRKXHyGSwB3ojXm6YmKn_vYWCjgM-VDTPTEzP-khJGlb9MqM8x-YTELKJ64$ 
    > 
    > 
    > 
    > Abstract:
    >   This document describes alternative IPv4 PMTUD procedures that do not
    >   prevent IP fragmentation and do no rely on the network's ability to
    >   deliver ICMP Destination Unreachable messages to the source node.
    >   This document also defines a new ICMP message.  IPv4 nodes emit this
    >   new message when they reassemble a fragmented packet.
    > 
    > 
    > 
    > 
    > Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
    > 
    > The IETF Secretariat
    > _______________________________________________
    > Int-area mailing list
    > Int-area@ietf.org
    > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/int-area__;!8WoA6RjC81c!XifH7EcqHRKXHyGSwB3ojXm6YmKn_vYWCjgM-VDTPTEzP-khJGlb9MqM8x-YOVqXLNE$